| |||||||||||||||
MPEIS 2011 : International Workshop on Model-Based and Policy-Based Engineering,in Information Security (DEADLINE EXTENSION) | |||||||||||||||
Link: http://www.icete.org/MPEIS.asp | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
DEADLINE EXTENSION -- MPEIS 2011
International Workshop on Model-Based and Policy-Based Engineering in Information Security. Co-located with ICETE 2011 Seville, Spain, 20 July, 2011. (http://www.icete.org/MPEIS.asp) ======================================================================== *Important dates* * Regular Paper Submission: April 26, 2011 * * Authors Notification: May 13, 2011 (extended) * * Final Paper Submission and Registration: May 11, 2011 * ======================================================================== Nowadays, IT Security is one of the top priorities for companies all over the world, as the increasing investment in security during the last years indicates. However, security-related technologies, such as Firewalls, IDS and Anti-virus systems are being configured and deployed today as it has been done over the last three decades. On the contrary, size, complexity, heterogeneity, and speed of changes have been increasing during the same period. Security aspects in most companies are, moreover, being incorporated into software systems as an add-on at the later stages of the development process. This implies that part of the investment in security is a waste of money. Future systems must be able to be designed from higher-level, platform-agnostic models. These models may also be diagnosed and corrected during early design stages to cut design and development costs and to assure some quality properties. These systems must be capable to react to internal or external events and reconfigure themselves to comply with their models. This workshop is an international forum on how to address these complexity-related issues in information security systems within Model-based and Policy-based Engineering paradigms. It aims at merging both communities, the first one strongly related with Software Engineering, and the second one tightly related with Network Security. The workshop will try to bring together people from both academia and industry, from all the different areas that want to/might play an active role in domains of both modeling and security to discuss problems, highlight possible solutions, disseminate success stories and also draft a possible research agenda. Topics of interest include, but are not limited to: * Model-Based Engineering in policy-based systems * Platform-independent and platform-specific models * Domain-specific modeling languages * Models of security properties and security systems * Validation and testing of model faults * Verification/Behavior analysis of deployed systems * Interoperability between security models * Security tools based on models * Design patterns for security * Secure and trustworthy policy management, deployment and enforcement * Security policy standards, extensions and refinements * Usability of security policy languages and representations * Policy visualization * Case studies of applying policy-based management in different domains * Autonomous (self-*) systems *Paper Submissions Guidelines* Prospective authors are invited to submit papers in any of the topics listed above. Instructions for preparing the manuscript (in Word and Latex formats) are available at http://www.icete.org/paper_templates.asp Please also check the Submission Guidelines at http://www.icete.org/submission\_guidelines.asp Papers should be submitted electronically via the web-based submission system at http://www.insticc.org/Primoris *Publication* All papers should be submitted in English language. The paper selection will be based upon the relevance of a paper to the main topics, on its originality, on its soundness, on its scientific quality and on the potential to stimulate discussion in the workshop. Submissions by PhD students as well as controversial ideas are encouraged. Case studies (successful or not) are also encouraged. Mainly theoretical papers are discouraged, specially if they do not address a real problem or has real-world examples. *Organizing Committee* * Sergio Pozo Hidalgo, University of Seville (ES) * Joaquin Garcia-Alfaro, TELECOM Bretagne (FR) * Rafael Martinez Gasca, University of Seville (ES) * A. J. Varela-Vaca, University of Seville (ES) *Program Committee* * Mohd Anwar, University of Pittsburgh (US) * Michel Barbeau, Carleton University (CA) * Jordi Cabot, Ecole des Mines de Nantes (FR) * Jordi Castella-Roca, Rovira i Virgily University (ES) * Valentina Ciriani, UNIMI (IT) * Emilio Corchado Rodríguez, University of Burgos (ES) * Frederic Cuppens, TELECOM Bretagne (FR) * Nora Cuppens-Boulahia, TELECOM Bretagne (FR) * Sabrina De Capitani di Vimercati, UNIMI (IT) * Josep Domingo-Ferrer, Rovira i Virgily University (ES) * David Evans, University of Cambridge (UK) * Eduardo Fernández-Medina Paton, UCLM (ES) * Dimitris Gritzalis, AUEB (GR) * Stefanos Gritzalis, University of the Aegean (GR) * Joaquin Garcia Alfaro, TELECOM Bretagne (FR) * Jordi Herrera-Joancomarti, UAB (ES) * Jan Jürgens, TU Dortmund and Fraunhofer ISST (GER) * Christos Kalloniatis, University of the Aegean (GR) * Evangelos Kranakis, Carleton University (CA) * Javier Lopez, University of Malaga (ES) * Fabio Massacci, Universita di Trento (IT) * Rafael Martinez Gasca, University of Seville (ES) * Christoph Meinel, University of Potsdam (GER) * Guillermo Navarro-Arribas, UAB (ES) * Sergio Pozo Hidalgo, University of Seville (ES) * Tomas Sander, Hewlett-Packard Labs (US) * Thierry Sans, Carnegie Mellon, Qatar (QA) * Marianthi Theoharidou, AUEB (GR) * Juan C. Trujillo Mondéjar, University of Alicante (ES) * Edgar Weippl, TU Wien (AUS) |
|